iSecur1ty / wifi-jammer
Python automated wifi jammer
☆36Updated 8 years ago
Related projects: ⓘ
- Hacking Tools☆39Updated 6 years ago
- Basic python script for detect airdroid users in lan☆46Updated 3 years ago
- GSM hacking tools and scripts☆49Updated 4 years ago
- Automatic Wifi Cracker. Uses Airodump, Aircrack, Aireplay☆65Updated 7 years ago
- Some scripts and stuff for wardriving and wifi hacks .... works great on kali and ubuntu 32 bit ...Reaver likes 32 bit binaries.☆23Updated 3 years ago
- hashcrack is a python script which uses online hash crackers to find cleartext of a hash in less than 3 seconds☆45Updated 6 years ago
- Python Security/Hacking Kit☆39Updated 4 years ago
- This tool will allows u to deauth or kick off an specific device from an given AP☆23Updated 2 years ago
- This project is aimed to automate hacking by a USB. Currently for Windows, different platforms coming soon☆13Updated 4 years ago
- The EVIL EMAIL/SMS BOMBER is made for research and testing purposes only. Prank your friends. EVIL EMAIL/SMS BOMBER can send bulk mail …☆44Updated 2 years ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆43Updated 7 years ago
- Portable Hacking Machine with Raspberry Pi☆72Updated 5 years ago
- This tool seeks to trace to a facebook user's public ip address by routing through OpenDNS switches.☆14Updated 8 years ago
- This bash script will install wifite2 and its other tools Pyrit, bully, wireshark, hcxtools, hcxdumptool, macchanger☆62Updated last year
- bluesnarfing proof-of-concept tool.☆44Updated 8 years ago
- ☆20Updated this week
- Hacking Wifi-Passwords,Chrome-Saved-Passwords,Copying the Scripts to Windows-Startup folder,Index-Sites-Files-Downloader☆26Updated 6 years ago
- FBI a info gathering tool, very useful for picking... Well... git clone and you'll see ;D☆20Updated 5 years ago
- A program that does Deauthentication Attack on every nearby wireless device☆23Updated 5 years ago
- A script that creates a wifi hotspot on kali linux that can view usernames and passwords of ssl logins.☆61Updated 8 years ago
- Detects near-by devices such as cell phones, tablets, and laptops. Does this through 802.11, Bluetooth, cell phone protocols, etc..☆14Updated 10 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆23Updated 5 years ago
- A remote keylogger with some cool features☆42Updated last month
- Most advanced framework yet! From spoofing to cryptography, Trity has it all!☆41Updated 7 years ago
- Silently logs and E-mails all incoming/outgoing calls and text messages while doubling up as a flashlight app. The app also has the abili…☆17Updated 3 years ago
- A router Sploit is the core of anyone's internet experience, but sadly most people don't spend much time setting up this critical piece o…☆54Updated 2 years ago
- Collection of white, grey and blackHat tools - for use playing around. setting up and operating pentesting linux builds - Primarily Kali-…☆18Updated 6 years ago
- Social Engineering Tool Oriented to facebook☆53Updated 7 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆26Updated 6 years ago
- A curated list of awesome warez and piracy links☆23Updated 3 years ago